Date: 15/MAY/2019 Summary: Hackers are using increasingly sophisticated techniques to hide malicious code on e-commerce websites with the goal of stealing payment card details. Known as web skimmers, these malicious … Continue reading Threat Intelligence Report: MageCart- Forbes
Date: 15/MAY/2019 Summary: Intel has published information about a new subclass of speculative execution side channel vulnerabilities known as Microarchitectural Data Sampling (MDS). These attacks are similar to the Spectre, … Continue reading Threat Intelligence Report: Intel Processor MDS Vulnerabilities – (ZombieLoad)
Date: 15/MAY/2019 Summary: Microsoft has released a patch for an elevation-of-privileges vulnerability rated important, which is being exploited in the wild. An elevation of privilege vulnerability exists in the way … Continue reading Threat Intelligence Report: Microsoft Zero-Day Bug Under Active Attack
Dated: 23rd April 2019 Summary A highly organized and successful scam group is targeting companies around the world with a renewed campaign. The group which has been named ‘London Blue’ … Continue reading Threat Intelligence Report: London Blue
Summary A series of high & medium severity vulnerabilities have been discovered on Cisco small business RV320 and RV325 routers. Detail Cisco vulnerability on Small Business RV320 and RV325 Routers … Continue reading Threat Intelligence Report- Cisco RV320 and RV325 Vulnerabilities
Date: 29 March 2019 Summary: A Zero-Day Vulnerability has recently been discovered in WinRAR. The vulnerability, which was assigned as CVE-2018-20250, allows attackers to set arbitrary destinations during file extraction … Continue reading Threat Intelligence Report: WinRAR Zero Day Threat
Threat intelligence is an elusive concept. Cyber-security vendors have developed numerous definitions for it based upon different procedural viewpoints. As a result, the key concept and principle of threat intelligence is explaining the role it plays within cyber-security and network defence, while offering advice and best practice. This will equip the reader with a basic understanding of the benefits of threat intelligence and the importance of investing effort and resources into responding to it.
Volume licensing is essentially a consumption-based pricing model: you pay for what you use. Traditional, on-premises SIEM (Security Information & Event Management) solutions usually operate on this basis, which has a number of key drawbacks for businesses:
Protecting an organisation from cyber crime is a relentless task, as both security solutions and means to attack continue to evolve. The repercussions of a security ‘incident’ can be costly, in terms of financial loss, data recovery and damage to reputation.
The threat landscape in the education sector comprises two distinct types of breach: deliberate and accidental. While it is not possible to remove these risks entirely, taking preventative steps and having a robust response system in place will help protect your organisation.
What springs to mind when you think of cyber security in education? It might be the responsibility to protect the data schools hold on pupils, staff and parents, including sensitive … Continue reading Cyber security in education
Hiring an in-house IT security function is often the first port of call for larger companies, however this can be an expensive route to take. With a skills shortage in … Continue reading Why should you outsource your cyber security?